نتایج جستجو برای: computer security
تعداد نتایج: 723551 فیلتر نتایج به سال:
A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. it becomes difficult for any security system to block all types of attacks. this gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss an...
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to com...
As our world becomes more computerized and interconnected, computer security and privacy will continue to increase in importance. In this paper, I overview several computer security and privacy challenges faced by end users of the technologies we build, and how we can design and build technologies that better match user expectations with respect to security and privacy. I close with open challe...
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures. While these external guidelines make recommendations as to how an organisation should develop and implement best practices in computer security they often fail to provide a mechanism that links th...
the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...
Vulnerabilities are errors in computer systems which can be exploited to breach security mechanisms. Such information can be very valuable as it decides about the success of attack or defense in computer networks. This essay introduces into the economic perspective on computer security and discusses the advantages and drawbacks of different concepts for vulnerability markets, where security-rel...
The need for computer security is commonly accepted today in government and industry. Numerous studies have shown both an increase in security incidents as well as an increase in interest by organizations to address security issues. Many security tools such as firewalls and intrusion detection systems are becoming commonplace in organizations yet intruders still are able to penetrate computer n...
information security practice and experience 10th international conference ispec 2014 fuzhou china may 5-8 2014 proceedings lecture notes in computer science security and cryptology PDF advances in cryptology-asiacrypt 96 international conference on the theory and applications of crypotology and information security kyongju lecture notes in computer science PDF image analysis 17th scandinavian ...
Computer security is a major issue facing the world we inhabit. Computer systems in a multitude of institutions and organizations hold our personal information. Furthermore, we rely on the safe working of computer systems to not only protect that data, but allow us to take advantage of the benefits technology has to offer. Various kinds of security technology protect these systems. However, the...
It has been identified that financial institutions are one of the major users of Information Technology hence the need to evaluate effective use of the computer security strategies. This study aimed at evaluating the effectiveness of computer and network security strategies employed in Nigerian banks. This study was led by the following objectives; to determine and assess the security strategie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید